☆50Mar 14, 2026Updated last week
Alternatives and similar repositories for rstools
Users that are interested in rstools are comparing it to the libraries listed below
Sorting:
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated last year
- ☆86Aug 8, 2024Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- A little cheatsheet for NetExec☆33May 2, 2024Updated last year
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 4 months ago
- ☆18Aug 1, 2022Updated 3 years ago
- Simple tool to test for SSRF/OOB HTTP Read within the Path of a request☆30Aug 2, 2019Updated 6 years ago
- ☆28May 25, 2021Updated 4 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Wordlists compiled from Bible verses☆21May 12, 2022Updated 3 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Mar 9, 2020Updated 6 years ago
- Wappalyzer CLI tool to find Web Technologies☆60Oct 6, 2023Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 2 weeks ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆84Oct 2, 2020Updated 5 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago